Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
freebsd vulnerabilities and exploits
(subscribe to this query)
187
VMScore
CVE-2007-6150
The "internal state tracking" code for the random and urandom devices in FreeBSD 5.5, 6.1 up to and including 6.3, and 7.0 beta 4 allows local users to obtain portions of previously-accessed random values, which could be leveraged to bypass protection mechanisms that re...
Freebsd Freebsd 6.2
Freebsd Freebsd 6.3
Freebsd Freebsd 5.5
Freebsd Freebsd 6.1
Freebsd Freebsd 7.0
730
VMScore
CVE-2000-0998
Format string vulnerability in top program allows local malicious users to gain root privileges via the "kill" or "renice" function.
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.5.1
Freebsd Freebsd 3.5
2 EDB exploits
1 Github repository
668
VMScore
CVE-2000-0388
Buffer overflow in FreeBSD libmytinfo library allows local users to execute commands via a long TERMCAP environmental variable.
Freebsd Freebsd 3.3
Freebsd Freebsd 3.4
Freebsd Freebsd 3.0
Freebsd Freebsd 3.2
Freebsd Freebsd 3.1
725
VMScore
CVE-2010-2693
FreeBSD 7.1 up to and including 8.1-PRERELEASE does not copy the read-only flag when creating a duplicate mbuf buffer reference, which allows local users to cause a denial of service (system file corruption) and gain privileges via the sendfile system call.
Freebsd Freebsd 7.1
Freebsd Freebsd 7.2
Freebsd Freebsd 7.3
Freebsd Freebsd 8.0
Freebsd Freebsd 8.1
1 EDB exploit
755
VMScore
CVE-2000-0916
FreeBSD 4.1.1 and previous versions, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote malicious users to spoof TCP connections.
Freebsd Freebsd 2.0
Freebsd Freebsd 4.0
Freebsd Freebsd 4.1
Freebsd Freebsd 4.1.1
Freebsd Freebsd 3.0
1 EDB exploit
418
VMScore
CVE-2009-4358
freebsd-update in FreeBSD 8.0, 7.2, 7.1, 6.4, and 6.3 uses insecure permissions in its working directory (/var/db/freebsd-update by default), which allows local users to read copies of sensitive files after a (1) freebsd-update fetch (fetch) or (2) freebsd-update upgrade (upgrade...
Freebsd Freebsd 8.0
Freebsd Freebsd 7.2
Freebsd Freebsd 7.1
Freebsd Freebsd 6.4
Freebsd Freebsd 6.3
725
VMScore
CVE-2008-5736
Multiple unspecified vulnerabilities in FreeBSD 6 prior to 6.4-STABLE, 6.3 prior to 6.3-RELEASE-p7, 6.4 prior to 6.4-RELEASE-p1, 7.0 prior to 7.0-RELEASE-p7, 7.1 prior to 7.1-RC2, and 7 prior to 7.1-PRERELEASE allow local users to gain privileges via unknown attack vectors relate...
Freebsd Freebsd 6.0
Freebsd Freebsd 6.3
Freebsd Freebsd 7.0
Freebsd Freebsd 7.1
Freebsd Freebsd 6.4
1 EDB exploit
725
VMScore
CVE-2011-4062
Buffer overflow in the kernel in FreeBSD 7.3 up to and including 9.0-RC1 allows local users to cause a denial of service (panic) or possibly gain privileges via a bind system call with a long pathname for a UNIX socket.
Freebsd Freebsd 9.0
Freebsd Freebsd 8.1
Freebsd Freebsd 8.2
Freebsd Freebsd 7.3
Freebsd Freebsd 7.4
1 EDB exploit
694
VMScore
CVE-2014-3000
The TCP reassembly function in the inet module in FreeBSD 8.3 before p16, 8.4 before p9, 9.1 before p12, 9.2 before p5, and 10.0 before p2 allows remote malicious users to cause a denial of service (undefined memory access and system crash) or possibly read system memory via mult...
Freebsd Freebsd 9.1
Freebsd Freebsd 8.3
Freebsd Freebsd 9.2
Freebsd Freebsd 10.0
Freebsd Freebsd 8.4
230
VMScore
CVE-2002-1125
FreeBSD port programs that use libkvm for FreeBSD 4.6.2-RELEASE and previous versions, including (1) asmon, (2) ascpu, (3) bubblemon, (4) wmmon, and (5) wmnet2, leave open file descriptors for /dev/mem and /dev/kmem, which allows local users to read kernel memory.
Freebsd Freebsd 4.5
Freebsd Freebsd 4.6
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Freebsd Freebsd 4.4
4 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »